CFOtech Australia - Technology news for CFOs & financial decision-makers

Cybercrime stories - Page 47

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Data out the backdoor

HBO breach: Centrify says 'winter is coming' for passwords

Thu, 10th Aug 2017
#
cybersecurity
#
hbo
#
centrify
HBO's soft underbelly was laid bare to the world after hackers stole 1.5 TB of data from its systems - Centrify says passwords' days are limited.
Targeting cyber threats

Cybercrime: What to expect for the rest of 2017 and how to prepare

Wed, 9th Aug 2017
#
malware
#
ddos
#
vpns
​So far this year we have already borne witness to a multitude of serious cybercrime. NordVPN has provided insights for what the second half may hold.
Hand data

Want to cause chaos? ICIT says hacking elections is easy

Mon, 7th Aug 2017
#
ddos
#
cybersecurity
#
elections
Hackers at DEFCON were able to exploit vulnerabilities in voting machines in a matter of minutes - ICIT breaks down just how easy it is.
Treasure trove

HBO's Game of Thrones treasure chest ransacked by hackers

Tue, 1st Aug 2017
#
malware
#
ransomware
#
cybersecurity
​It would seem winter has come for HBO after hackers have stormed the company's servers and looted the jewels within to leak data online.
Email scam

Nearly a quarter of 'unsafe' emails getting through to user inboxes

Fri, 28th Jul 2017
#
malware
#
ransomware
#
cybersecurity
There is a continuous challenge of securing organisations from malicious attachments, dangerous files type, impersonation attacks as well as spam.
Trojan virus

Malware found prowling within every app of alternative Android store

Thu, 27th Jul 2017
#
malware
#
cybersecurity
#
apps
Malware researcher at ESET, Lukáš Štefanko says this is the first time he has ever seen an entire Android market infected like that.
Cybercriminall

The Dark Web: Is your company at risk?

Thu, 27th Jul 2017
#
risk & compliance
#
cybersecurity
#
opinion
Not only is information on a company's assets available, but information about new techniques to compromise targets is for sale on the dark web.
Data out the backdoor

Cisco reveals alarming findings from Midyear Cybersecurity Report

Wed, 26th Jul 2017
#
malware
#
ransomware
#
cybersecurity
The Cisco Midyear Cybersecurity Report warns of rapidly evolving threats and potential 'destruction of service' (DeOS) attacks.
Data leaky tap

Digital Shadows discovers credit card crime ring cashing in on $24b a year

Tue, 25th Jul 2017
#
risk & compliance
#
cybersecurity
#
credit card fraud
A professional ecosystem has emerged that is providing e-learning courses to allow aspiring cybercriminals to make USD$12k in monthly earnings.
Network padlock broken

Hackers steal $32m of ethereum cryptocurrency – expert commentary and advice

Sat, 22nd Jul 2017
#
crypto
#
blockchain
#
ai security
​In the second heist this week, hackers have stolen around US$32 million - Webroot senior threat analyst shares his commentary and insights.
Screen shot 2017 06 21 at 12

The malware that brought down Ukraine – is it really that sophisticated?

Wed, 21st Jun 2017
#
malware
#
cybersecurity
#
hackers
Tenable director says the significance of this malware as a stand-alone event is in fact quite small - but vendors have some catching up to do.
Thinkstockphotos 653516378

Arbor Networks digs deep into the Lazarus Group's DDoS attacks

Mon, 19th Jun 2017
#
ddos
#
cybersecurity
#
arbor networks
It is not clear whether the IPs listed in the report were part of a command and control infrastructure or simply bots - or both.
Thinkstockphotos 673040004

War of the words: How cybercriminals are selling fake news through the underground

Wed, 14th Jun 2017
#
cybersecurity
#
trend micro
#
cybercrime
Fake news is being sold as a service on the underground market, with criminals offering to manipulate public opinion for a price.
Brian lord obe min

GCHQ deputy director - 'Cybersecurity vendors need to quit their scaremongering'

Wed, 7th Jun 2017
#
cybersecurity
#
cybercrime
#
gchq
Cybersecurity experts warn that the industry is far behind where it needs to be, making it too easy for cybercriminals to operate.
Money flowing from tap

Cost of cybercrime for businesses to surpass $8 trillion over next five years

Thu, 1st Jun 2017
#
malware
#
ransomware
#
cybersecurity
New insights from Juniper Research have predicted a rather dire future for modern businesses in the constant war against cybercrime.
Thinkstockphotos 492668571

The need for internet security on your mobile

Mon, 29th May 2017
#
endpoint protection
#
phishing
#
email security
As hackers target mobile devices, it's imperative to ensure that you are aware of the threats that are out there, and that your phone is protected.
Thinkstockphotos 486018827

Hungry 'Fatboy' ransomware uses Big Mac Index to geotarget ransom demands

Tue, 9th May 2017
#
malware
#
ransomware
#
cybersecurity
The Fatboy ransomware is able to use the Big Mac Index, created in 1986, to determine the cost of living for a particular geographic location.
Cybercriminial

Cybercriminals use verified API token to generate Facebook spam comments

Fri, 28th Apr 2017
#
api
#
cybersecurity
#
facebook
In exchange for more 'likes' and comments on their own timelines, users are enticed to provide the app's access token to a third-party website.
Thinkstockphotos 489433130

When imitation is not the sincerest form of flattery

Thu, 13th Apr 2017
#
phishing
#
email security
#
cybersecurity
Early detection and effective intelligence is critical in today's digital world to mitigate the risks created by today's connected world.
Thinkstockphotos 485041902

Getting more Instagram followers? Could be a scam

Wed, 15th Mar 2017
#
malware
#
cybersecurity
#
instagram
Cybercriminals have been targeting Instagram users by luring them to install these apps, which claim to boost their Instagram followers.